Feature :
- Overview of the Web and what hackers go after
- Complete Web application security methodologies
- Detailed analysis of hack techniques
- Countermeasures
- Cyber graffiti and Web site defacements
- e-Shoplifting
- Database access and Web applications
- Java(TM) application servers; how to harden your Java(TM) Web Server
- Impersonation and session hijacking
- Buffer overflows, the most wicked of attacks
- Automated attack tools and worms
ShoutMix chat widget
0 komentar:
Post a Comment